Category: cybersecurity
You are viewing all posts from this category, beginning with the most recent.
๐๐ก๏ธ
The world found out shortly before 2 p.m. eastern time on March 15 that the United States was bombing Houthi targets across Yemen. I, however, knew two hours before the first bombs exploded that the attack might be coming. The reason I knew this is that Pete Hegseth, the secretary of defense, had texted me the war plan at 11:44 a.m. The plan included precise information about weapons packages, targets, and timing. This is going to require some explaining.
๐ก๏ธ The final big project at my last org was a Wiz implementation for 1k+ cloud accounts.
It was an excellent solution, especially at our scale.
Yet, Iโm still slightly-stunned by the $32B purchase price.
I do wonder what it means for ongoing support for non-GCP clouds.
๐๏ธ๐ก๏ธ Interesting conversation on Risky Biz comparing TikTok and X.
I would disagree that there isnโt already influence in TikTok 1, but it is certainly less flagrant than you see on X.
-
All algorithmically-controlled feeds reflect the biases of their creators, owners, and governors. โฉ๏ธ
๐ก๏ธ An iCloud Backdoor Would Make Our Phones Less Safe
A technical means of access canโt be limited to only people with proper legal authority.
๐ก๏ธ Trying something new:
I wrote a roundup of some of my professional connections this week.
๐ก๏ธ I can confirm this analysis from lcamtuf: How security teams fail
Itโs relevant to why I put so much emphasis on cybersecurity strategy, principles, and communications.
Iโve been staying with my Mom while she recovers from surgery, and sheโs been watching the news. It is 99% propaganda, vapid, or irrelevant. Makes me want to go into news.
๐ Still true! If you are doing something in journalism and need cybersecurity help, please let me know!
๐๏ธ๐ Tomorrow Iโm recording for the eXecutive Security Podcast.
My bar for podcasts:
โIs this a better use of my time than an audiobook?โ
So I take this pretty seriously. Hopefully weโll make it worth your listening time.
๐ The 2024 edition of CWE Top 25 is published:
Most Dangerous Software Weaknesses
โBut what about the OWASP Top 10?โ Think of the OWASP list as more of an engagement and learning tool.
The CWE 25 can more effectively be used as a target list to build your evaluation, mitigation, and prevention.